
Atiq khan
Wednesday, 22 July 2020
Neural network
One of the most powerful things about our brains is the way neurons allow us to learn. Computer scientists have been inspired by the way they work to make machines that learn too, programming networks of artificial neurons called neural networks In the past 10 years, the best-performing artificial-intelligence systems — such as the speech recognizers on smartphones or Google’s latest automatic translator — have resulted from a technique called “deep learning.”
Deep learning is in fact a new name for an approach to artificial intelligence called neural networks, which have been going in and out of fashion for more than 70 years. Neural networks were first proposed in 1944 by Warren McCullough and Walter Pitts, two University of Chicago researchers who moved to MIT in 1952 as founding members of what’s sometimes called the first cognitive science department.
Neural nets were a major area of research in both neuroscience and computer science until 1969, when, according to computer science lore, they were killed off by the MIT mathematicians Marvin Minsky and Seymour Papert, who a year later would become co-directors of the new MIT Artificial Intelligence Laboratory.

Friday, 30 August 2019
Thursday, 29 August 2019
SOFTWARE PIRACY AND ETHICAL HACKING

Tuesday, 6 August 2019
HACKER BLACK HAT
A black hat hacker (or black-hat hacker) is a hacker who violates computer security for personal gain or maliciousness.
The
term's origin is often attributed to hacker culture theorist Aniket (though he denies coining it) to contrast the exploitative hacker with the white hat hacker who hacks protectively by drawing attention to vulnerabilities in computer systems that require repair.[2] The black hat/white hat terminology originates in the Western genre of popular American culture, in which black and white hats denote villainous and heroic cowboys respectively
Black hat hackers are the stereotypical illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal"
Black hat hackers break into secure networks to destroy, modify, or steal data, or to make the networks unusable for authorized network users

Wednesday, 29 May 2019
Anonymous is a decentralized international hacktivist group that is widely known for its various DDoS cyber attacks against several governments, government institutions and government agencies, corporations, and the Church of Scientology.
Membership: Decentralized affinity group
Motto: We Are Anonymous
Saturday, 18 May 2019
SECURITY MECHANISM
These are the step to prevent from hacking
.Encipherment
. Digital signature
.Access controle
.Authentication exchange
.Traffic podding
Encipherment
is type of security mechanism in Which we hide actual data and we do not show real and actual data
In another mechanism which is the
digital signature
it maintain the authenticity and intigirity in digital signature when sender send the data it generate a key and attached with message the key is only for authenticated receiver and when receiver get the message use the key to decode or decrypt it
Access control
In this mechanism we give the priority that which data is highly confidential and which is not and in this manner we control the access to data
and manage that which data are for public access and which data is private access
Authentication exchange
Authentication exchange are used for to identify the authenticated user by the information exchange
Traffic podding
In this mechanism we hide some data packet from the path so the hacker can not access full data in this mechanism hacker even do not understand what is actula source of data transmission
Routing control
To prevent hacking threat we use routing control it mean when we data transfer router uses many different way to get deliverd at destination in this hacker typically get access to data with help of routing control we can use different path for data transfer
.Encipherment
. Digital signature
.Access controle
.Authentication exchange
.Traffic podding
- .Routing control
Encipherment
is type of security mechanism in Which we hide actual data and we do not show real and actual data
In another mechanism which is the
digital signature
it maintain the authenticity and intigirity in digital signature when sender send the data it generate a key and attached with message the key is only for authenticated receiver and when receiver get the message use the key to decode or decrypt it
Access control
In this mechanism we give the priority that which data is highly confidential and which is not and in this manner we control the access to data
and manage that which data are for public access and which data is private access
Authentication exchange
Authentication exchange are used for to identify the authenticated user by the information exchange
Traffic podding
In this mechanism we hide some data packet from the path so the hacker can not access full data in this mechanism hacker even do not understand what is actula source of data transmission
Routing control
To prevent hacking threat we use routing control it mean when we data transfer router uses many different way to get deliverd at destination in this hacker typically get access to data with help of routing control we can use different path for data transfer
Wednesday, 15 May 2019
CRYPTOGRAPHY & SECURITY ATTACKS
First we discussed about what is cryptography
Its the secure communication from sender to receiver in the persence of third party by using encryption keys that is public key and private key if the data is ecrypted by using private then the message or data will be decrypted only with public key
And if the data is encrypted with the public key then it will be decrypted with private key it is the main concept of encryption and decryption
Security attacks in computer language its define as the unauthorized access to the system by sending sime malecious and virus there are two type of security attacks
● passive
Passive attack have two sub category
. Release of message content
. Traffic analysis
● active
In active attack data stolen from the middle of path and its able to modify and add some new bit with original message.
In the active attack message is not in its original form it becom crrupted
●Passive attacks
In this types of attack haker or intrudure only read the data it is not able to modify or edit the real message sender send the message and receiver authorizes to get message but third party steal the message from the path
By the help of traffic analysis
Hacker can track the path that from where the data is being send and to the whome it is being deliverd by the help of traffic analysis
Subscribe to:
Posts (Atom)
Neural network
One of the most powerful things about our brains is the way neurons allow us to learn. Computer scientists have been inspired by the way th...

-
Inheritance , polymorphism , Abstraction ,& Data encapsulation _____. We all ready discu...
-
The act of copying software without being authorized for its uses its termed as software piracy if some needs to use particular soft...
-
Will computer connect with human mind and combine the power of human mind and computer become super power ( Brain – computer interfa...